Analysis

  • max time kernel
    155s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-10-2022 02:21

General

  • Target

    9e096f8047a59487e5a3b5f3fd0a978079cb2338ab76c9b57b9f087c203a096e.exe

  • Size

    103KB

  • MD5

    64bd00b9c5f6995ffb6216ada779e180

  • SHA1

    57d0d3231b38e11c420b94880e00cdd6fdaa6d32

  • SHA256

    9e096f8047a59487e5a3b5f3fd0a978079cb2338ab76c9b57b9f087c203a096e

  • SHA512

    c2e5e8c8a1346742a45499bfb83f5f5cb4f2cbe91e23667a25d6dd84f1cb444dbcb6e2a248550eccc115ac7bd017707f956552c738d2db994eeb80e74e281ba0

  • SSDEEP

    1536:ez2KWezrNpfv2cWSFpLWG77ozdIFzskPxp5fu6W4kw7YUP6zhSFvBo9:zK5fWqFIkid7kpTfu7wMcvo

Malware Config

Signatures

  • Contacts a large (2050) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Registers COM server for autorun 1 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies registry class 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9e096f8047a59487e5a3b5f3fd0a978079cb2338ab76c9b57b9f087c203a096e.exe
    "C:\Users\Admin\AppData\Local\Temp\9e096f8047a59487e5a3b5f3fd0a978079cb2338ab76c9b57b9f087c203a096e.exe"
    1⤵
    • Registers COM server for autorun
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies registry class
    PID:1928
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k netsvcs -p
    1⤵
    • Drops file in System32 directory
    • Checks processor information in registry
    • Enumerates system info in registry
    PID:116

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1928-132-0x0000000000400000-0x0000000000437000-memory.dmp

    Filesize

    220KB

  • memory/1928-133-0x00000000001D0000-0x00000000001ED000-memory.dmp

    Filesize

    116KB

  • memory/1928-134-0x00000000001D0000-0x00000000001ED000-memory.dmp

    Filesize

    116KB

  • memory/1928-135-0x0000000000400000-0x0000000000437000-memory.dmp

    Filesize

    220KB